↓ Skip to main content

Advances in Cryptology — CRYPTO’ 88

Overview of attention for book
Advances in Cryptology — CRYPTO’ 88
Springer New York

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Weakening Security Assumptions and Oblivious Transfer
  3. Altmetric Badge
    Chapter 2 Limits on the Provable Consequences of One-way Permutations
  4. Altmetric Badge
    Chapter 3 Generalized Secret Sharing and Monotone Functions
  5. Altmetric Badge
    Chapter 4 Everything Provable is Provable in Zero-Knowledge
  6. Altmetric Badge
    Chapter 5 A Perfect Zero-Knowledge Proof for a Problem Equivalent to Discrete Logarithm
  7. Altmetric Badge
    Chapter 6 Zero-Knowledge With Finite State Verifiers
  8. Altmetric Badge
    Chapter 7 Intractable Problems in Number Theory
  9. Altmetric Badge
    Chapter 8 A Family of Jacobians Suitable for Discrete Log Cryptosystems
  10. Altmetric Badge
    Chapter 9 Computation of Approximate L-th Roots Modulo n and Application to Cryptography
  11. Altmetric Badge
    Chapter 10 On the McEliece Public-Key Cryptosystem
  12. Altmetric Badge
    Chapter 11 A Constraint Satisfaction Algorithm for the Automated Decryption of Simple Substitution Ciphers
  13. Altmetric Badge
    Chapter 12 On the Existence of Pseudorandom Generators
  14. Altmetric Badge
    Chapter 13 On The Randomness of Legendre and Jacobi Sequences
  15. Altmetric Badge
    Chapter 14 Efficient, Perfect Random Number Generators
  16. Altmetric Badge
    Chapter 15 How To Sign Given Any Trapdoor Function
  17. Altmetric Badge
    Chapter 16 A “Paradoxical” Indentity-Based Signature Scheme Resulting from Zero-Knowledge
  18. Altmetric Badge
    Chapter 17 A Modification of the Fiat-Shamir Scheme
  19. Altmetric Badge
    Chapter 18 An Improvement of the Fiat-Shamir Identification and Signature Scheme
  20. Altmetric Badge
    Chapter 19 A Basic Theory of Public and Private Cryptosystems
  21. Altmetric Badge
    Chapter 20 Proving Security Against Chosen Ciphertext Attacks
  22. Altmetric Badge
    Chapter 21 Non-Interactive Zero-Knowledge with Preprocessing
  23. Altmetric Badge
    Chapter 22 The Noisy Oracle Problem
  24. Altmetric Badge
    Chapter 23 On Generating Solved Instances of Computational Problems
  25. Altmetric Badge
    Chapter 24 Bounds and Constructions for Authentication - Secrecy Codes with Splitting
  26. Altmetric Badge
    Chapter 25 Untraceable Electronic Cash
  27. Altmetric Badge
    Chapter 26 Payment Systems and Credential Mechanisms with Provable Security Against Abuse by Individuals
  28. Altmetric Badge
    Chapter 27 A Universal Problem in Secure and Verifiable Distributed Computation
  29. Altmetric Badge
    Chapter 28 An Abstract Theory of Computer Viruses
  30. Altmetric Badge
    Chapter 29 Abuses in Cryptography and How to Fight Them
  31. Altmetric Badge
    Chapter 30 How to (Really) Share a Secret
  32. Altmetric Badge
    Chapter 31 The Strict Avalanche Criterion: Spectral Properties of Boolean Functions and an Extended Definition
  33. Altmetric Badge
    Chapter 32 On the Linear Syndrome Method in Cryptanalysis
  34. Altmetric Badge
    Chapter 33 Aperiodic Linear Complexities of de Bruijn Sequences
  35. Altmetric Badge
    Chapter 34 The Application of Smart Cards for Rsa Digital Signatures in a Network Comprising Both Interactive and Store-and-Forward Facilities
  36. Altmetric Badge
    Chapter 35 Speeding Up Secret Computations with Insecure Auxiliary Devices
  37. Altmetric Badge
    Chapter 36 Developing Ethernet Enhanced-Security System
  38. Altmetric Badge
    Chapter 37 A Secure Audio Teleconference System
  39. Altmetric Badge
    Chapter 38 Diffie-Hellman is as Strong as Discrete Log for Certain Primes
  40. Altmetric Badge
    Chapter 39 Secret Error-Correcting Codes (SECC)
  41. Altmetric Badge
    Chapter 40 The Detection of Cheaters in Threshold Schemes
  42. Altmetric Badge
    Chapter 41 On the Power of 1-way Functions
  43. Altmetric Badge
    Chapter 42 “Practical IP” ⊆ MA
  44. Altmetric Badge
    Chapter 43 Zero-Knowledge Authentication Scheme with Secret Key Exchange
Attention for Chapter 3: Generalized Secret Sharing and Monotone Functions
Altmetric Badge

Mentioned by

twitter
1 X user

Readers on

mendeley
104 Mendeley
citeulike
3 CiteULike
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Generalized Secret Sharing and Monotone Functions
Chapter number 3
Book title
Advances in Cryptology — CRYPTO’ 88
Published by
Springer, New York, NY, August 1988
DOI 10.1007/0-387-34799-2_3
Book ISBNs
978-0-387-97196-4, 978-0-387-34799-8
Authors

Josh Benaloh, Jerry Leichter

Timeline

Login to access the full chart related to this output.

If you don’t have an account, click here to discover Explorer

X Demographics

X Demographics

The data shown below were collected from the profile of 1 X user who shared this research output. Click here to find out more about how the information was compiled.
As of 1 July 2024, you may notice a temporary increase in the numbers of X profiles with Unknown location. Click here to learn more.
Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 104 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
United Kingdom 1 <1%
Canada 1 <1%
Singapore 1 <1%
China 1 <1%
Japan 1 <1%
United States 1 <1%
Unknown 98 94%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 30 29%
Student > Master 20 19%
Researcher 13 13%
Student > Postgraduate 6 6%
Professor > Associate Professor 6 6%
Other 20 19%
Unknown 9 9%
Readers by discipline Count As %
Computer Science 69 66%
Engineering 10 10%
Mathematics 6 6%
Physics and Astronomy 4 4%
Psychology 1 <1%
Other 2 2%
Unknown 12 12%